{"id":2867,"date":"2015-02-10T11:03:15","date_gmt":"2015-02-10T11:03:15","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2015\/02\/10\/information-extracted-from-online-documents\/"},"modified":"2019-12-11T13:59:02","modified_gmt":"2019-12-11T13:59:02","slug":"information-extracted-from-online-documents","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/","title":{"rendered":"Information extracted from online documents"},"content":{"rendered":"<p>Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius coder\u201d will fly their fingers across the keyboard before seconds later dropping the painfully trite and clich\u00e9d line \u201cI\u2019m in\u201d. Hacking in real-life, whether performed during a sanctioned penetration test or genuine attack, simply does not happen like this. Penetration testers and \u201cblack hats\u201d alike typically follow a cyclic multi-step methodology which includes the following activities: information gathering, scanning, exploitation and maintaining access. Each of these phases involves multiple tasks, which are often extensive and laborious. Although exploitation typically attracts the most coverage, because it is the stage in which a host becomes compromised, many in the security industry are united in the opinion that information gathering is the most critical episode in determining the likelihood of a successful penetration.<\/p>\n<p>During the information gathering stage an attacker will attempt to uncover important details about their target. Inadvertently and unknowingly, many organisations are making this process easier by needlessly giving away sensitive information in the documents they host, post or exchange online. Applications which create the common file types we all routinely use such as PDF, DOC, PPT, XLS and JPEG bundle metadata and hidden information into the file. Left unsanitized, these documents, which seemingly contain only innocuous information, can in fact be laced with vital clues about your networking environment and security posture.<\/p>\n<p>Tools such as FOCA (short for Fingerprinting Organizations with Collected Archives) and Metagoofil are great for revealing these useful snippets of information and are freely available to download. When fed with a domain name they will use specially crafted queries in search engines to find the documents hosted on the specified site. These and other files can be run through the built-in metadata extractor before the tool quickly generates an easy to interpret analysis of the findings. So what information can be lurking behind the scenes in these files and what are these tools capable of recovering? Well, lots actually. Host names, IP addresses, the types and versions of operating systems and software deployed on your network, geo-location data, usernames and email addresses; even the odd password. Such knowledge would pay dividends to the attacker in the later stages of a physical, social engineering or electronic engagement.<\/p>\n<p>Fortunately, this information is easily removed so organisations needn\u2019t handover this important data so readily. Most word processing applications will provide the facility to do this automatically.<\/p>\n<p>The following link shows an example using Microsoft Office 2010 and 2013:<br \/>\n<a href=\"https:\/\/office.microsoft.com\/en-gb\/word-help\/remove-hidden-data-and-personal-information-by-inspecting-documents-HA010354329.aspx\">https:\/\/office.microsoft.com\/en-gb\/word-help\/remove-hidden-data-and-pers&#8230;<\/a><\/p>\n<p>Follow this link if you or your company use Microsoft Office 2007:<br \/>\n<a href=\"https:\/\/office.microsoft.com\/en-us\/excel-help\/remove-hidden-data-and-personal-information-from-office-documents-HA010037593.aspx\">https:\/\/office.microsoft.com\/en-us\/excel-help\/remove-hidden-data-and-pers&#8230;<\/a><\/p>\n<p>A quick query using your favourite search engine will display links to similar how-to pages for other word processing and general office applications.<\/p>\n<p>Organisations would be wise to ensure that the documents they host and distribute, both internally and externally, are effectively sanitized prior to publication and exchange. Making staff aware of the information they could be giving away, developing policies and providing the appropriate training are good ways of doing this. Information gathering is often a long and complex procedure and there are multitudes of ways that an attacker can gain clues about you and your company. Sanitizing your documents just makes their job a little harder.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius coder\u201d will fly their fingers across the keyboard before seconds later dropping the painfully trite and clich\u00e9d line \u201cI\u2019m in\u201d. Hacking in real-life, whether performed during a sanctioned penetration test or genuine [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[209],"class_list":["post-2867","post","type-post","status-publish","format-standard","hentry","category-researchblog","tag-infrastructure","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information extracted from online documents<\/title>\n<meta name=\"description\" content=\"Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information extracted from online documents\" \/>\n<meta property=\"og:description\" content=\"Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-10T11:03:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-11T13:59:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Information extracted from online documents\",\"datePublished\":\"2015-02-10T11:03:15+00:00\",\"dateModified\":\"2019-12-11T13:59:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/\"},\"wordCount\":561,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\"},\"keywords\":[\"infrastructure\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/\",\"name\":\"Information extracted from online documents\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\"},\"datePublished\":\"2015-02-10T11:03:15+00:00\",\"dateModified\":\"2019-12-11T13:59:02+00:00\",\"description\":\"Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/information-extracted-from-online-documents\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information extracted from online documents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information extracted from online documents","description":"Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/","og_locale":"en_US","og_type":"article","og_title":"Information extracted from online documents","og_description":"Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius","og_url":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2015-02-10T11:03:15+00:00","article_modified_time":"2019-12-11T13:59:02+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Information extracted from online documents","datePublished":"2015-02-10T11:03:15+00:00","dateModified":"2019-12-11T13:59:02+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/"},"wordCount":561,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"keywords":["infrastructure"],"articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/","url":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/","name":"Information extracted from online documents","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"datePublished":"2015-02-10T11:03:15+00:00","dateModified":"2019-12-11T13:59:02+00:00","description":"Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the \u201cgenius","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/information-extracted-from-online-documents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Information extracted from online documents"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Kf","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=2867"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2867\/revisions"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=2867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=2867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=2867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}